We develop approximation algorithms for set-selection problems with deterministic constraints, but random objective values, i.e., stochastic probing problems. When the goal is to maximize the objective, approximation ...
详细信息
Wireless Sensor Networks are deployed to sense data from the physical world and transmit these data to the server(s). To reduce the maintenance cost of replacing batteries, Energy-Harvesting nodes are developed which ...
详细信息
Jack-up is a type of offshore platforms using for oil & gas exploitation in Vietnam. In operating conditions, jack-up hull structures with large weight are lifted to high elevation and supported by slender leg str...
详细信息
A path is isometric if it is a shortest path between its endpoints. In this article, we consider the graph covering problem Isometric Path Cover, where we want to cover all the vertices of the graph using a minimum-si...
详细信息
We study the maximum geometric independent set and clique problems in the streaming model. Given a collection of geometric objects arriving in an insertion only stream, the aim is to find a subset such that all object...
详细信息
Several gaps and errors in "Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels" by Fang et al. are identified and corrected. While accommodating these corrections, a rigours proof is...
详细信息
Several gaps and errors in "Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels" by Fang et al. are identified and corrected. While accommodating these corrections, a rigours proof is given that the successive convex approximation algorithm of Fang et al. for secrecy rate maximization (SRM) does generate an increasing and bounded sequence of true secrecy rates and hence converges. It is further shown that its convergence point is a KKT point of the original SRM problem and, if the original problem is convex, this convergence point is globally-optimal, which is not necessarily the case in general. An interlacing property of the sequences of the true and approximate secrecy rates is established.
Many research works in computational social choice assume a fixed set of voters in an election and study the resistance of different voting rules against electoral manipulation. In recent years, however, a new techniq...
详细信息
We present a new approach for solving (minimum disagreement) correlation clustering that results in sublinear algorithms with highly efficient time and space complexity for this problem. In particular, we obtain the f...
详细信息
Given a simple graph G and an integer k, the goal of the k-Clique problem is to decide if G contains a complete subgraph of size k. We say an algorithm approximates k-Clique within a factor g(k) if it can find a cliqu...
详细信息
In this brief we propose a novel hardware implementation for a bidimensional unconstrained hierarchical clustering method, based on fuzzy logic and membership functions. Unlike classical clustering approaches, this br...
详细信息
In this brief we propose a novel hardware implementation for a bidimensional unconstrained hierarchical clustering method, based on fuzzy logic and membership functions. Unlike classical clustering approaches, this brief is based on an advanced algorithm that shows an intrinsic parallelism. Such parallelism can be exploited to design an efficient hardware implementation suitable for low-resources, low-power and high-computational demanding applications like smart-sensors and IoT devices. We validated our design by an extensive simulation campaign on well known 2D clustering datasets. Our solution shows the same clustering performances of the original algorithm despite the applied mathematical approximations and the small word-lengths used in the fixed point arithmetic.
暂无评论